BUISENESS MANAGEMENT
RISK MANAGEMENT
Question
[CLICK ON ANY CHOICE TO KNOW THE RIGHT ANSWER]
|
Francine is a security specialist for an online service provider in the United States. She recently received a claim from a copyright holder that a user is storing information on her service that violates the third party’s copyright. What law governs the actions that Francine must take?
|
Copyright Act
|
|
Lanham Act
|
|
Digital Millennium Copyright Act
|
|
Gramm Leach Bliley Act
|
Explanation:
Detailed explanation-1: -Defense in depth states that organizations should have overlapping security controls designed to meet the same security objectives whenever possible. This approach provides security in the event of a single control failure.
Detailed explanation-2: -Confidentiality protects sensitive information from unauthorized disclosure or intelligible interception. Cryptography and access control are used to protect confidentiality.
Detailed explanation-3: -SLAs do not normally address issues of data confidentiality. Those provisions are normally included in a non-disclosure agreement (NDA).
Detailed explanation-4: -What information security principle is the keylogger most likely designed to disrupt? confidentiality.
There is 1 question to complete.